You are on page 1of 9

POLÍCIA NACIONAL DEL PERÚ

ESCUELA NACÍONAL DE FORMACIÓN PROFESIONAL


ENFPP EESTP PNP- POLICÍAL

HCO

ESCUELA
PROTECTORES DE LA DEMOCRACIA NACÍONAL DE
FORMACIÓN
PROFESIONAL
POLOCÍAL

CIBERSEGURIDAD

Monografía:

2023
 CIBERSEGURIDAD
_ ALO1 PNP VICTORIO LOPEZ, JORLIN SMITH.
_ ALO1 PNP SALDOVAL PALOMINO, DELVIS.

02/06
1
ESCUELA NACÍONAL DE FORMACIÓN PROFESIONAL
POLICÍAL

DEDICATION
This research work is completely dedicated to God,
our teacher, parents who have inspired us with their
work to successfully complete this project. Thank
you so much.

INTRODUCTION

2
ESCUELA NACÍONAL DE FORMACIÓN PROFESIONAL
POLICÍAL

Computer networks have become a fundamental pillar of teamwork, it is possible to share all kinds
of documents, live music and videos, live calls and other services, networks have no barrier and
allow contact with the most remote places of all over the world, they have become a necessary
element of business. Based on the importance of network communication, SMEs have chosen to
implement systems that allow them to automate processes that lead to the improvement and growth
of the business, so data protection and awareness of the proper use of technologies are essential.,
Knowing that in the computer world it moves in great masses, computer crime seeks to alter, steal
and damage the information that transits daily through the networks.

The controls that must be implemented in a network, basically start with the diagnosis and review
of how the systems are currently configured in the SME and the policies for the proper use of the
systems, thus closing the possibility of computer attacks and spread of viruses, are You must take
into account that the adoption of security controls starts as a first step in the good use of computer
resources, and later the configuration of the same by policies that reduce the risk of facing a cyber
attack, the spread of malware or virus computer.

3
ESCUELA NACÍONAL DE FORMACIÓN PROFESIONAL
POLICÍAL

CYBER SEGURITY
HISTORICAL REVIEW

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks.
Typically, these cyberattacks aim to access, modify, or destroy sensitive information; Extort money
from users or users or disrupt business continuity.

A successful cybersecurity approach has multiple layers of protection spread across the computers,
networks, programs, or data that one intends to keep safe. In an organization, people, processes, and
technology must complement each other to create an effective defense against cyberattacks. A
unified threat management system can automate integrations between select Cisco security products
and accelerate key security operations functions: detection, investigation, and remediation.

 HOW CYBERSECURITY WORKS

Cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems,
networks, and data from malicious attack. It is also known as information technology security or
electronic information security.

TIPES OF CYBERSECURITY
After understanding the general bases of computer security, we are more than ready to delve into
the topic that has brought us here today, which is to discover what kinds of cybersecurity exist. And
it is that depending on which part of the computer system it acts on, the moment in which it is
applied and if it is intended for an individual or a corporation, we can differentiate different types of
computer security.

 HARDWARE CYBERSECURITY

4
ESCUELA NACÍONAL DE FORMACIÓN PROFESIONAL
POLICÍAL

Hardware cybersecurity is that modality that seeks to protect the integrity of the physical support of
a computer system. And it is that the hardware is the set of physical elements and devices that
represent the components or accessories of a computer. Put simply but clearly, it is everything you
can see and touch on a computer, mobile, console, tablet, etc.

 SOFTWARE CYBERSECURITY

Software cybersecurity is that modality that seeks to protect the integrity of the operational support
of a computer system. And it is that the software is the set of programs and collection of codes that
serve as instructions for the computer to execute its functions. Put simply but clearly, it is
everything that you cannot see or touch but that represents the "mind" of the computer.

 NETWORK CYBERSECURITY

Network cybersecurity is that modality that seeks to protect the integrity of information during the
processes of issuing and receiving it between different computer systems, preventing it from being
intercepted and decrypted by a third person along the way. Thus, computer network security is one
that does not protect the hardware or software of a system, but rather the information itself while it
is transmitted between units.

 PERSONAL CYBERSECURITY

Personal cybersecurity is that which is applied to an individual user in a private environment. Thus,
computer security guidelines affect a particular device user, with a computer equipment that has a
single owner, that person.

With respect to the corporate one that we will now see, it is the most massive, since in the world
there are more than 7,000 million smartphones and some 2,000 million private computers.

 CORPORATE CYBERSECURITY

5
ESCUELA NACÍONAL DE FORMACIÓN PROFESIONAL
POLICÍAL

Corporate cybersecurity is one that is applied to a company in a business environment. It is a more


dangerous terrain, since bankruptcies in security systems do not affect only a user, but the company
itself and its potential customers and suppliers. This, coupled with the fact that there is increased
interest from cybercriminals, makes it essential that, especially the larger ones, there are
cybersecurity experts to protect the data of these corporations.

 NATIONAL CYBERSECURITY

National cybersecurity is one that is applied to the computer systems that are part of a State
network. Thus, we are not dealing with an individual or a company, but with the entire computer
network of a country. Therefore, strategies must be implemented to protect all confidential data of
the State, since a cyberattack can represent a serious crisis for the nation.

 ACTIVE CYBERSECURITY

By active cybersecurity we understand all those protection strategies that are activated when the
defenses of a computer system have been attacked. An attack has occurred since a hacker has
managed to circumvent the defenses, so strategies must be initiated to combat this cyberattack and
protect or, in the worst case, recover the information that has been stolen.

 PASSIVE CYBERSECURITY

By passive cybersecurity, on the other hand, we understand all those protection strategies that
prevent cyberattacks. They are always active, forming solid defenses that prevent computer attacks
from occurring, anticipating such threats before they occur and generating walls that must have as
few breaches as possible.

 PHYSICAL CYBERSECURITY

Physical cybersecurity is a computer security closely related to hardware that is based on an analog
protection of the system.

6
ESCUELA NACÍONAL DE FORMACIÓN PROFESIONAL
POLICÍAL

In other words, it is a traditional and rudimentary security that consists of keeping physical elements
away from any physical danger related to environmental damage such as fire, water, dust and,
ultimately, any external agent that may compromise functionality. of the apparatus.

 LOGICAL CYBERSECURITY

In other words, it is a traditional and rudimentary security that consists of keeping physical elements
away from any physical danger related to environmental damage such as fire, water, dust and,
ultimately, any external agent that may compromise functionality. of the apparatus.

¿COMO APLICAR LA CIBERSEGURIDAD?

To do this, it is only necessary to visualize how much data is processed every day on the computer,
tablet or smartphone, how many accounts are used in the different applications of the various
Internet platforms and how much bank and credit data and sensitive information are consulted. All
this data is susceptible to attacks and without protection, it is exposed to the actions of
cybercriminals.

CÓMO BLOQUEAR EL ROBO DE DATOS


To avoid cybercrime as much as possible, it is only necessary to follow a series of very basic and
simple but effective guidelines to make it very difficult for data thieves. Here we show you some:

INSTALAR GADGETS. Reinforced lead credit card holders, for example, help prevent
offline data theft and hinder access to sensitive information.

INSERTAR CONTRASEÑAS SEGURAS. Although it seems like obvious advice, it is


the simplest and most effective protection method, either to prevent a user from starting
another computer or to block a hacker trying to access an email account.

7
ESCUELA NACÍONAL DE FORMACIÓN PROFESIONAL
POLICÍAL

UTILIZAR CORTAFUEGOS. This can be installed on the computer or on the router. The
firewall prevents unauthorized access to the computer itself or the network itself. In
addition, by means of the corresponding settings, you can configure which people or which
programs can access the Internet from the network.
TENER UN ANTIVIRUS. It not only offers protection against viruses, trojans and other
types of malware, but also removes them on the spot. It is important to perform regular
scans on the computer or on the network to obtain an optimal level of cybersecurity.

3 BUENAS PRÁCTICAS PARA EVITAR


CIBERATAQUES
To guarantee computer security in companies or in any other environment, in addition to special
cybersecurity tools, it is advisable to resort to a series of tricks and good practices that have proven
their effectiveness for years.

1. TENER EL SISTEMA OPERATIVO SIEMPRE ACTUALIZADO

Installing the most current version of the operating system and applications on towers, laptops,
tablets or smartphones is essential, as outdated programs are more susceptible to attacks.

2. CONFIGURAR LA ÚLTIMA VERSIÓN DE ANTIVIRUS Y FIREWALLS

In this way, everyday dangers and large-scale ones in companies or workplaces equipped with
computers are avoided.

3. CONTROLAR QUÉ PERSONAS TIENEN ACCESO A DATOS

Never lose sight of the people who can access or edit certain data of our company. The logs are
usually useful to keep an eye on which users have been active.

8
ESCUELA NACÍONAL DE FORMACIÓN PROFESIONAL
POLICÍAL

CONCLUDE
Cybersecurity is not a simple topic. Regardless of the level of thoroughness with which protection
measures can be implemented on the Internet and in other sectors of the digital environment, gaps
and weaknesses always arise, which attackers exploit with sophisticated methods. Therefore,
installing tools to prevent cyberattacks both in the workplace and in the private sphere is essential.

You might also like